CVE-2024-41977

Aug. 13, 2024, 12:58 p.m.

7.1
High

Description

A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.1), SCALANCE M812-1 ADSL-Router family (All versions < V8.1), SCALANCE M816-1 ADSL-Router family (All versions < V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.1). Affected devices do not properly enforce isolation between user sessions in their web server component. This could allow an authenticated remote attacker to escalate their privileges on the devices.

Product(s) Impacted

Product Versions
RUGGEDCOM RM1224 LTE(4G) EU
  • < V8.1
RUGGEDCOM RM1224 LTE(4G) NAM
  • < V8.1
SCALANCE M804PB
  • < V8.1
SCALANCE M812-1 ADSL-Router family
  • < V8.1
SCALANCE M816-1 ADSL-Router family
  • < V8.1
SCALANCE M826-2 SHDSL-Router
  • < V8.1
SCALANCE M874-2
  • < V8.1
SCALANCE M874-3
  • < V8.1
SCALANCE M874-3 3G-Router (CN)
  • < V8.1
SCALANCE M876-3
  • < V8.1
SCALANCE M876-4
  • < V8.1
SCALANCE MUM853-1 (A1)
  • < V8.1
SCALANCE MUM853-1 (B1)
  • < V8.1
SCALANCE MUM853-1 (EU)
  • < V8.1
SCALANCE MUM856-1 (A1)
  • < V8.1
SCALANCE MUM856-1 (B1)
  • < V8.1
SCALANCE MUM856-1 (CN)
  • < V8.1
SCALANCE MUM856-1 (EU)
  • < V8.1
SCALANCE MUM856-1 (RoW)
  • < V8.1
SCALANCE S615 EEC LAN-Router
  • < V8.1
SCALANCE S615 LAN-Router
  • < V8.1

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-488
Exposure of Data Element to Wrong Session
The product does not sufficiently enforce boundaries between the states of different sessions, causing data to be provided to, or used by, the wrong session.

CVSS Score

7.1 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Privileges Required: LOW
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

    View Vector String

Timeline

Published: Aug. 13, 2024, 8:15 a.m.
Last Modified: Aug. 13, 2024, 12:58 p.m.

Status : Undergoing Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

productcert@siemens.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.